Persistent SASL errors with psmdb helm installation

Hi, after installing psmdb with helm, I am getting persistent messages from the rs0 pod.

│ mongod {"t":{"$date":"2025-02-18T05:47:01.164+00:00"},"s":"I",  "c":"ACCESS",   "id":20251,   "ctx":"conn388","msg":"Supported SASL mechanisms requested for unknown user","attr":{"user":{"user":"clusterMonitor","db":""}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:01.164+00:00"},"s":"I",  "c":"ACCESS",   "id":5286202, "ctx":"conn388","msg":"Different user name was supplied to saslSupportedMechs","attr":{"error":{"code":17,"codeName":"ProtocolError","errmsg":"Attempt to switch database target during SASL authentication from clusterMonitor@ to @admin"}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:01.165+00:00"},"s":"I",  "c":"ACCESS",   "id":6788604, "ctx":"conn388","msg":"Auth metrics report","attr":{"metric":"acquireUser","micros":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:01.169+00:00"},"s":"I",  "c":"ACCESS",   "id":5286306, "ctx":"conn388","msg":"Successfully authenticated","attr":{"client":"10.21.53.147:35236","isSpeculative":true,"isClusterMember":false,"mechanism":"SCRAM-SHA-256","user":"clusterMonitor","db":"admin","result":0,"metrics":{"conversation_duration":{"micros":4233,"summa
│ mongod {"t":{"$date":"2025-02-18T05:47:01.169+00:00"},"s":"I",  "c":"NETWORK",  "id":6788700, "ctx":"conn388","msg":"Received first command on ingress connection since session start or auth handshake","attr":{"elapsedMillis":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:01.173+00:00"},"s":"I",  "c":"-",        "id":20883,   "ctx":"conn387","msg":"Interrupted operation as its client disconnected","attr":{"opId":519169}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.274+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn391","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.274+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn391","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.286+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn393","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.287+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn393","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.287+00:00"},"s":"I",  "c":"ACCESS",   "id":20251,   "ctx":"conn393","msg":"Supported SASL mechanisms requested for unknown user","attr":{"user":{"user":"clusterAdmin","db":""}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.287+00:00"},"s":"I",  "c":"ACCESS",   "id":5286202, "ctx":"conn393","msg":"Different user name was supplied to saslSupportedMechs","attr":{"error":{"code":17,"codeName":"ProtocolError","errmsg":"Attempt to switch database target during SASL authentication from clusterAdmin@ to @admin"}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.287+00:00"},"s":"I",  "c":"ACCESS",   "id":6788604, "ctx":"conn393","msg":"Auth metrics report","attr":{"metric":"acquireUser","micros":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.290+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn392","msg":"Ingress TLS handshake complete","attr":{"durationMillis":7}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.290+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn392","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.291+00:00"},"s":"I",  "c":"ACCESS",   "id":5286306, "ctx":"conn393","msg":"Successfully authenticated","attr":{"client":"10.21.53.148:44134","isSpeculative":true,"isClusterMember":false,"mechanism":"SCRAM-SHA-256","user":"clusterAdmin","db":"admin","result":0,"metrics":{"conversation_duration":{"micros":3851,"summary
│ mongod {"t":{"$date":"2025-02-18T05:47:04.293+00:00"},"s":"I",  "c":"NETWORK",  "id":6788700, "ctx":"conn393","msg":"Received first command on ingress connection since session start or auth handshake","attr":{"elapsedMillis":2}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.321+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn394","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.321+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn394","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.329+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn395","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.329+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn395","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.331+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn396","msg":"Ingress TLS handshake complete","attr":{"durationMillis":4}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.331+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn396","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.332+00:00"},"s":"I",  "c":"ACCESS",   "id":20251,   "ctx":"conn396","msg":"Supported SASL mechanisms requested for unknown user","attr":{"user":{"user":"userAdmin","db":""}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.332+00:00"},"s":"I",  "c":"ACCESS",   "id":5286202, "ctx":"conn396","msg":"Different user name was supplied to saslSupportedMechs","attr":{"error":{"code":17,"codeName":"ProtocolError","errmsg":"Attempt to switch database target during SASL authentication from userAdmin@ to @admin"}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.332+00:00"},"s":"I",  "c":"ACCESS",   "id":6788604, "ctx":"conn396","msg":"Auth metrics report","attr":{"metric":"acquireUser","micros":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.336+00:00"},"s":"I",  "c":"ACCESS",   "id":5286306, "ctx":"conn396","msg":"Successfully authenticated","attr":{"client":"10.21.53.148:44158","isSpeculative":true,"isClusterMember":false,"mechanism":"SCRAM-SHA-256","user":"userAdmin","db":"admin","result":0,"metrics":{"conversation_duration":{"micros":3794,"summary":{
│ mongod {"t":{"$date":"2025-02-18T05:47:04.336+00:00"},"s":"I",  "c":"NETWORK",  "id":6788700, "ctx":"conn396","msg":"Received first command on ingress connection since session start or auth handshake","attr":{"elapsedMillis":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.367+00:00"},"s":"I",  "c":"-",        "id":20883,   "ctx":"conn394","msg":"Interrupted operation as its client disconnected","attr":{"opId":528385}}
│ mongod {"t":{"$date":"2025-02-18T05:47:04.396+00:00"},"s":"I",  "c":"-",        "id":20883,   "ctx":"conn391","msg":"Interrupted operation as its client disconnected","attr":{"opId":524289}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.949+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn398","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.949+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn398","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.958+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn399","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.958+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn399","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.958+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn400","msg":"Ingress TLS handshake complete","attr":{"durationMillis":4}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.958+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn400","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.960+00:00"},"s":"I",  "c":"ACCESS",   "id":20251,   "ctx":"conn400","msg":"Supported SASL mechanisms requested for unknown user","attr":{"user":{"user":"clusterAdmin","db":""}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.960+00:00"},"s":"I",  "c":"ACCESS",   "id":5286202, "ctx":"conn400","msg":"Different user name was supplied to saslSupportedMechs","attr":{"error":{"code":17,"codeName":"ProtocolError","errmsg":"Attempt to switch database target during SASL authentication from clusterAdmin@ to @admin"}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.960+00:00"},"s":"I",  "c":"ACCESS",   "id":6788604, "ctx":"conn400","msg":"Auth metrics report","attr":{"metric":"acquireUser","micros":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:09.964+00:00"},"s":"I",  "c":"ACCESS",   "id":5286306, "ctx":"conn400","msg":"Successfully authenticated","attr":{"client":"10.21.53.148:49738","isSpeculative":true,"isClusterMember":false,"mechanism":"SCRAM-SHA-256","user":"clusterAdmin","db":"admin","result":0,"metrics":{"conversation_duration":{"micros":4178,"summary
│ mongod {"t":{"$date":"2025-02-18T05:47:09.964+00:00"},"s":"I",  "c":"NETWORK",  "id":6788700, "ctx":"conn400","msg":"Received first command on ingress connection since session start or auth handshake","attr":{"elapsedMillis":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.003+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn401","msg":"Ingress TLS handshake complete","attr":{"durationMillis":8}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.003+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn401","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.060+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn403","msg":"Ingress TLS handshake complete","attr":{"durationMillis":3}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.061+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn403","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.062+00:00"},"s":"I",  "c":"NETWORK",  "id":6723804, "ctx":"conn404","msg":"Ingress TLS handshake complete","attr":{"durationMillis":5}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.062+00:00"},"s":"W",  "c":"NETWORK",  "id":23236,   "ctx":"conn404","msg":"Client connecting with server's own TLS certificate"}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.063+00:00"},"s":"I",  "c":"ACCESS",   "id":20251,   "ctx":"conn404","msg":"Supported SASL mechanisms requested for unknown user","attr":{"user":{"user":"userAdmin","db":""}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.063+00:00"},"s":"I",  "c":"ACCESS",   "id":5286202, "ctx":"conn404","msg":"Different user name was supplied to saslSupportedMechs","attr":{"error":{"code":17,"codeName":"ProtocolError","errmsg":"Attempt to switch database target during SASL authentication from userAdmin@ to @admin"}}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.063+00:00"},"s":"I",  "c":"ACCESS",   "id":6788604, "ctx":"conn404","msg":"Auth metrics report","attr":{"metric":"acquireUser","micros":0}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.066+00:00"},"s":"I",  "c":"ACCESS",   "id":5286306, "ctx":"conn404","msg":"Successfully authenticated","attr":{"client":"10.21.53.148:49760","isSpeculative":true,"isClusterMember":false,"mechanism":"SCRAM-SHA-256","user":"userAdmin","db":"admin","result":0,"metrics":{"conversation_duration":{"micros":3793,"summary":{
│ mongod {"t":{"$date":"2025-02-18T05:47:10.068+00:00"},"s":"I",  "c":"NETWORK",  "id":6788700, "ctx":"conn404","msg":"Received first command on ingress connection since session start or auth handshake","attr":{"elapsedMillis":1}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.096+00:00"},"s":"I",  "c":"-",        "id":20883,   "ctx":"conn401","msg":"Interrupted operation as its client disconnected","attr":{"opId":537601}}
│ mongod {"t":{"$date":"2025-02-18T05:47:10.130+00:00"},"s":"I",  "c":"-",        "id":20883,   "ctx":"conn398","msg":"Interrupted operation as its client disconnected","attr":{"opId":532481}}
│

helm values

finalizers:
  - percona.com/delete-psmdb-pods-in-order

nameOverride: ""
fullnameOverride: ""

crVersion: 1.19.0
pause: false
unmanaged: false
unsafeFlags:
  tls: false
  replsetSize: false
  mongosSize: false
  terminationGracePeriod: false
  backupIfUnhealthy: false

enableVolumeExpansion: false

annotations: {}

multiCluster:
  enabled: false
updateStrategy: SmartUpdate
upgradeOptions:
  versionServiceEndpoint: https://check.percona.com
  apply: disabled
  schedule: "0 2 * * *"
  setFCV: false

image:
  repository: percona/percona-server-mongodb
  tag: 8.0.4-1-multi

imagePullPolicy: Always
secrets: {}

pmm:
  enabled: false
  image:
    repository: percona/pmm-client
    tag: 2.44.0
  serverHost: monitoring-service

replsets:
  rs0:
    name: rs0
    size: 3
    serviceAccountName: psmdb-operator
    affinity:
      antiAffinityTopologyKey: "kubernetes.io/hostname"
    podDisruptionBudget:
      maxUnavailable: 1
    expose:
      enabled: false
      type: ClusterIP
    resources:
      limits:
        cpu: "300m"
        memory: "0.5G"
      requests:
        cpu: "300m"
        memory: "0.5G"
    volumeSpec:
      pvc:
        storageClassName: gp3
        resources:
          requests:
            storage: 3Gi
    nonvoting:
      enabled: false
      size: 3
      affinity:
        antiAffinityTopologyKey: "kubernetes.io/hostname"
      podDisruptionBudget:
        maxUnavailable: 1
      resources:
        limits:
          cpu: "300m"
          memory: "0.5G"
        requests:
          cpu: "300m"
          memory: "0.5G"
      volumeSpec:
        pvc:
          resources:
            requests:
              storage: 3Gi
    arbiter:
      enabled: false
      size: 1
      affinity:
        antiAffinityTopologyKey: "kubernetes.io/hostname"

backup:
  enabled: false

sharding:
  enabled: false
  balancer:
    enabled: true

  configrs:
    size: 3
    affinity:
      antiAffinityTopologyKey: "kubernetes.io/hostname"
    podDisruptionBudget:
      maxUnavailable: 1
    expose:
      enabled: false
      type: ClusterIP
    resources:
      limits:
        cpu: "300m"
        memory: "0.5G"
      requests:
        cpu: "300m"
        memory: "0.5G"
    volumeSpec:
      pvc:
        storageClassName: gp3
        resources:
          requests:
            storage: 3Gi
  mongos:
    size: 3
    affinity:
      antiAffinityTopologyKey: "kubernetes.io/hostname"
    podDisruptionBudget:
      maxUnavailable: 1
    resources:
      limits:
        cpu: "300m"
        memory: "0.5G"
      requests:
        cpu: "300m"
        memory: "0.5G"
    expose:
      enabled: false
      type: ClusterIP

Installation commands

kubectl create ns psmdb
helm install psmdb-operator percona/psmdb-operator --namespace psmdb
helm install -f psmdb/psmdb/base/values.yaml psmdb percona/psmdb-db --namespace psmdb

If you connect with a command, the connection works fine.
However, I’m curious about the SASL message that keeps coming up.

  kubectl run -i --rm --tty percona-client --image=percona/percona-server-mongodb:7.0 --restart=Never \
  -- mongosh "mongodb+srv://${ADMIN_USER}:${ADMIN_PASSWORD}@psmdb-psmdb-db-rs0.psmdb.svc.cluster.local/admin?replicaSet=rs0&ssl=false"